-
1
-
-
47249101556
-
-
I. Aktug, M. Dam, D. Gurov, Provably correct runtime monitoring, in: Proceedings of the 15th International Symposium on Formal Methods, FM'08, in: Lecture Notes in Computer Science, vol. 5014, Turku, Finland, May 2008, pp. 262-277
-
I. Aktug, M. Dam, D. Gurov, Provably correct runtime monitoring, in: Proceedings of the 15th International Symposium on Formal Methods, FM'08, in: Lecture Notes in Computer Science, vol. 5014, Turku, Finland, May 2008, pp. 262-277
-
-
-
-
2
-
-
31844457357
-
-
L. Bauer, J. Ligatti, D. Walker, Composing security policies with Polymer, in: Proc. of the ACM SIGPLAN Conf. on Prog. Lang. Design and Implementation, 2005, pp. 305-314
-
L. Bauer, J. Ligatti, D. Walker, Composing security policies with Polymer, in: Proc. of the ACM SIGPLAN Conf. on Prog. Lang. Design and Implementation, 2005, pp. 305-314
-
-
-
-
3
-
-
66849138438
-
-
L. Bauer, J. Ligatti, D. Walker, Composing expressive run-time security policies, ACM Transactions on Software Engineering and Methodology, 2008 (in press)
-
L. Bauer, J. Ligatti, D. Walker, Composing expressive run-time security policies, ACM Transactions on Software Engineering and Methodology, 2008 (in press)
-
-
-
-
4
-
-
0001107626
-
Memory-efficient algorithms for the verification of temporal properties
-
Courcoubetis C., Vardi M., Wolper P., and Yannakakis M. Memory-efficient algorithms for the verification of temporal properties. Formal Methods in System Design 1 2-3 (1992) 275-288
-
(1992)
Formal Methods in System Design
, vol.1
, Issue.2-3
, pp. 275-288
-
-
Courcoubetis, C.1
Vardi, M.2
Wolper, P.3
Yannakakis, M.4
-
5
-
-
56349168167
-
-
N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan, Security-by-contract: Toward a semantics for digital signatures on mobile code, in: European PKI Workshop: Theory and Practice, 2007 (in press)
-
N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan, Security-by-contract: Toward a semantics for digital signatures on mobile code, in: European PKI Workshop: Theory and Practice, 2007 (in press)
-
-
-
-
6
-
-
56349170935
-
-
Ú. Erlingsson, The inlined reference monitor approach to security policy enforcement, Ph.D. Thesis, Dep. of Computer Science, Cornell University, 2004
-
Ú. Erlingsson, The inlined reference monitor approach to security policy enforcement, Ph.D. Thesis, Dep. of Computer Science, Cornell University, 2004
-
-
-
-
9
-
-
18944390941
-
The model checker SPIN
-
Holzmann G.J. The model checker SPIN. Software Engineering 23 5 (1997) 279-295
-
(1997)
Software Engineering
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.J.1
-
10
-
-
26444441275
-
On the equivalence and containment problems for context-free languages
-
Hopcroft J.E. On the equivalence and containment problems for context-free languages. Theory of Computing Systems 3 2 (1969) 119-124
-
(1969)
Theory of Computing Systems
, vol.3
, Issue.2
, pp. 119-124
-
-
Hopcroft, J.E.1
-
11
-
-
84976739235
-
On equivalence and containment problems for formal languages
-
Hunt H.B., and Rosenkrantz D.J. On equivalence and containment problems for formal languages. Journal of ACM 24 3 (1977) 387-396
-
(1977)
Journal of ACM
, vol.24
, Issue.3
, pp. 387-396
-
-
Hunt, H.B.1
Rosenkrantz, D.J.2
-
12
-
-
84957836728
-
A decision algorithm for full propositional temporal logic
-
Kesten Y., Manna Z., McGuire H., and Pnueli A. A decision algorithm for full propositional temporal logic. CAV (1993) 97-109
-
(1993)
CAV
, pp. 97-109
-
-
Kesten, Y.1
Manna, Z.2
McGuire, H.3
Pnueli, A.4
-
13
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
(Published online 26 Oct 2004)
-
Ligatti J., Bauer L., and Walker D. Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security 4 1-2 (2005) 2-16 (Published online 26 Oct 2004)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
14
-
-
56349092028
-
-
F. Massacci, I. Siahaan, Matching midlet's security claims with a platform security policy using automata modulo theory, in: in Proc. of The 12th Nordic Workshop on Secure IT Systems, NordSec'07, October 2007
-
F. Massacci, I. Siahaan, Matching midlet's security claims with a platform security policy using automata modulo theory, in: in Proc. of The 12th Nordic Workshop on Secure IT Systems, NordSec'07, October 2007
-
-
-
-
18
-
-
46049083056
-
-
D. Vanoverberghe, F. Piessens, A caller-side inline reference monitor for an object-oriented intermediate language, in: Proc. of the 10th IFIP International Conference on Formal Methods for Open Object-based Distributed Systems, FMOODS'08, Oslo, Norway, June 4-6, 2008, in: Lecture Notes in Computer Science, vol. 5051, Springer, 2008, pp. 240-258
-
D. Vanoverberghe, F. Piessens, A caller-side inline reference monitor for an object-oriented intermediate language, in: Proc. of the 10th IFIP International Conference on Formal Methods for Open Object-based Distributed Systems, FMOODS'08, Oslo, Norway, June 4-6, 2008, in: Lecture Notes in Computer Science, vol. 5051, Springer, 2008, pp. 240-258
-
-
-
-
19
-
-
56349110601
-
-
A. Zobel, C. Simoni, D. Piazza, X. Nunez, D. Rodriguez, Business case and security requirements, Public Deliverable D5.1.1, S3MS. http://s3ms.org, October 2006
-
A. Zobel, C. Simoni, D. Piazza, X. Nunez, D. Rodriguez, Business case and security requirements, Public Deliverable D5.1.1, S3MS. http://s3ms.org, October 2006
-
-
-
|